General

  • Target

    a8123e0809d10c57f74e31e3a91cfb41b0aef390b343107f2a3765d0dc8ed4d6

  • Size

    935KB

  • Sample

    221125-lks1xsbh3w

  • MD5

    6aef4e0b86e3c8757ff86344a2036869

  • SHA1

    8ef498121bc2137684ab95ae43d65a7d5c524bb6

  • SHA256

    a8123e0809d10c57f74e31e3a91cfb41b0aef390b343107f2a3765d0dc8ed4d6

  • SHA512

    8d3e8e60557cc6ad75b149d1a87d09e62511656c5b15376171c4ff0b79ceb9bd11e8507228677bc68526de317c2f3e91b1b9021cf9ace7201e85cd6687c00fb2

  • SSDEEP

    12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4U:JyHv5Z+Wzv7AiBll0OBWi6si9Gh

Score
8/10
upx

Malware Config

Targets

    • Target

      a8123e0809d10c57f74e31e3a91cfb41b0aef390b343107f2a3765d0dc8ed4d6

    • Size

      935KB

    • MD5

      6aef4e0b86e3c8757ff86344a2036869

    • SHA1

      8ef498121bc2137684ab95ae43d65a7d5c524bb6

    • SHA256

      a8123e0809d10c57f74e31e3a91cfb41b0aef390b343107f2a3765d0dc8ed4d6

    • SHA512

      8d3e8e60557cc6ad75b149d1a87d09e62511656c5b15376171c4ff0b79ceb9bd11e8507228677bc68526de317c2f3e91b1b9021cf9ace7201e85cd6687c00fb2

    • SSDEEP

      12288:J5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4U:JyHv5Z+Wzv7AiBll0OBWi6si9Gh

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks